What are the common computer viruses?
According to the virus existence media, the virus can divide into the network virus, the file virus, the boot type virus. Network virus spreads the executable file in the network through the computer network, file viruses infect files on your computer (such as: Com,exe,doc, etc.), boot-type virus infection boot sector (boot) and the system Boot sector (MBR) of the hard
Departure: Silicon Valley Power cool guest heaven
If you have experience in Internet cafes or data center management, you must know that virus cultivation is a headache. Most of the current viruses have strong replication capabilities and can be spread over local networks, A large amount of system resources are consumed. If one server is infected with viruses in a local network, and the virus is not immedi
Many people call malware a virus, but this is not accurate from a professional perspective. You may have heard of many words out of virus scope: malware, worms, Trojans, root access tools, keyboard record tools, spyware, and so on. What are the meanings of these words?
These terms are not only used between hackers, but are also widely used in news, network security issues, and technological news. Understanding them helps us understand the dangers.
Malware
"Malware" is short for "malware ". Many
Computers are connected to the network every day. Nowadays, there are countless Trojan viruses on the network, and viruses will inevitably happen one day. So what should we do after the virus? The correct solution can avoid greater losses and minimize the damage caused by viruses. Let's take a look.
I. MediumVirusSymptom
When your computer is infected with
Three methods are used to detect hidden viruses in hard disks and memory, and three methods are used to detect viruses.
In fact, the computer virus is like a person who is ill, there will be some kind of symptoms, the virus will leave marks for infection. Therefore, to detect computer viruses, you also need to be targeted. If something goes wrong, check the viru
The so-called traditional virus refers to the virus of the boot type and the file type. The writing of this virus requires considerable experience in programming and a deep understanding of the DOS operating system, designing a virus usually takes several days to weeks, but on the contrary, it is easy to write the most popular file macro virus. Skilled people can create a virus in dozens of minutes, several virus variants can be made in one day, so writing v
Type 218.197.192.254 00-01-02-03-04-05 static at this moment, if the type changes to static, it will not be affected by the attack. However, it should be noted that the manual binding will expire after the computer is shut down and restarted, and you need to bind it again. Therefore, to completely eradicate the attack, only computers infected with viruses in the CIDR block should be found to prevent viruses
enter, it is also relatively fast.
4. Open the registry, set the CheckedValue on the Right of hkey_local_machinesoftwaremicrosoftwindowscurrentversionpoliceradvancedfolderhiddenshowall to 1, and then you can open the hidden file. Use winrar's viewing function or use the resource manager to delete the 8-bit random number. dll and autoruns under a partition directory, and delete C: PROGRA ~ 1COMMON ~ 1 micros ~ An 8-bit random number in 1 MSINFO. dll and 8-bit random number. dat. delete the tempo
A variety of viruses today can be regarded as a blossoming, make a panic, once found that their computer is a bit abnormal to identify the virus in the mischief, everywhere looking for anti-virus software, a no, and then one, in short, it seems not to find "culprit" just like, the result of virus software is used one after another Perhaps for this the renminbi is used one after another, or not see the "culprit" traces, in fact this is not necessarily
General clearing technology for computer virusesHttp://www.williamlong.info/archives/456.html
This is the second article I wrote in a magazine 10 years ago. Published in the third phase of the 1997 microcomputer world.
At that time, I was very interested in computer viruses. When I first went to college in year 92, I didn't actually have any idea about computer viruses. I just thought it was mysterious and
The origins of computer viruses
The concept of computer viruses actually originated quite early, and in the years before the first commercial computer appeared, the pioneer of computer Neumann (John Von Neumann) in one of his papers, "The theory and understanding of complex automata", has outlined the blueprint for viral programs. At the time, however, the vast majority of computer experts were unable to i
First, the question of the proposed
Most of the Trojan and part of the virus is through the registry from the start or file association or through the system services to achieve since the start, see the "Windows from the start", that there is a way to prevent Trojans or viruses to modify registry entries and increase service?
Ii. solution to the problem
The Windows2000/xp/2003 registry can set permissions, but we use less. Set permissions for the foll
Have experience in Internet cafes or computer room management friends must know, if the virus in the machine is a very annoying thing, now most of the virus has a strong ability to replicate, can be spread through the LAN, a large number of resources to consume systems and other characteristics, a local area network as long as there is a computer virus, if not timely anti-virus and isolation words , other machines will soon become infected with the virus, how to prevent the virus, and rapid anti
Any viruses and Trojans exist in the system, can not completely and process out of the relationship, even if the use of hidden technology, but also can find clues from the process, therefore, viewing the process of the system activity is the most direct way to detect the virus Trojan. But the system runs at the same time so many processes, which is the normal system process, which is the process of Trojans, and often by virus Trojan fake system proces
Access this article describes the techniques for using Access's security features and good habits to control access macro viruses.
Anti-virus common skills
It is important to keep your antivirus software updated at all times. New viruses appear every day, anti-virus vendors also through the network, BBS and other carriers to constantly introduce the latest virus database and software, so a focus on security
Any viruses and Trojans exist in the system, can not completely and process out of the relationship, even if the use of hidden technology, but also can find clues from the process, therefore, viewing the process of the system activity is the most direct way to detect the virus Trojan. But the system runs at the same time so many processes, which is the normal system process, which is the process of Trojans, and often by virus Trojan fake system proces
All kinds of viruses have been put together today. Once you find that your computer is abnormal, it is regarded as a virus, and anti-virus software is everywhere, in a word, it seems that we cannot find the "culprit". As a result, the virus software has been used one after another. Maybe the RMB has been used one after another, or no trace of "culprit" has been found, in fact, this is not necessarily a virus.
Such examples are not uncommon, especi
1. Establish good safety habits such as: do not open a number of unknown e-mails and attachments, do not have a few sites do not understand, do not perform the download from the Internet without anti-virus processing software, etc., these necessary habits will make your computer more secure.
2. Turn off or remove unwanted services from the system by default, many operating systems install some ancillary services, such as FTP clients, Telnet, and WEB servers. These services provide an attacker w
Many times we have used anti-virus software to find their own machines such as backdoor. rmtbomb.12, trojan.win32.sendip.15 and so on these a string of English also with digital virus name, at this time some people on the Meng, so long a string of names, how do I know what the virus ah?
In fact, as long as we know some of the virus naming rules, we can use the anti-virus software report in the virus name to determine the virus some of the public characteristics.
So many
With the popularization of computer and the development of information technology, the word "computer virus" is no longer unfamiliar to everyone, and nowadays computer viruses are emerging, even the vast majority of users have almost to "talk about poison color change" degree. Jiangmin's technical engineers have found that many users are not so knowledgeable about the files under the operating system that they have all sorts of suspicions.
The follow
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.